Critical Vulnerability discovered in libssh (CVE-2018-10933)

libssh, a tiny C SSH library, contains an authentication bypass vulnerability in libssh’s server-side code.

An attacker can take advantage of this flaw to successfully authenticate without any credentials by presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication.

Red Hat

This vulnerability affects libssh shipped in Red Hat Enterprise Linux 7 Extras. No libssh packages are included in Red Hat Enterprise Linux 6 and earlier. This issue does not affect libssh2 or openssh.

 

Ubuntu

the following releases of Ubuntu and its derivatives are affected:

  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.10

  • libssh-4 – 0.8.1-1ubuntu0.1

Ubuntu 18.04 LTS

  • libssh-4 – 0.8.0~20170825.94fa1e38-1ubuntu0.1

Ubuntu 16.04 LTS

  • libssh-4 – 0.6.3-4.3ubuntu0.1

Ubuntu 14.04 LTS

  • libssh-4 – 0.6.1-0ubuntu3.4

 

Debian

For the stable distribution (stretch), this problem has been fixed in version 0.7.3-2+deb9u1.

 

Oracle MySQL

This vulnerability was patched with Oracle’s Critical Patch Update for january:

More information can be found on this page

 

Join Our Online Security and Hosting Newsletter Today

and stay updated with the latest news, updates, releases & much more.
Subscribe
SUBSCRIBE NOW

Join Our Online Security and Hosting Newsletter Today

and stay updated with the latest news, updates, releases & much more.
Subscribe
SUBSCRIBE NOW
close-link